[1] |
KOCHER P , JAFFE J , JUN B . Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Proceedings of 16th International Advances in Cryptology Conference-CRYPTO‘96[C]. 1996.104-113.
|
[2] |
YENS M , LIEN W C , MOONS J , et al. Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mecha-nism for RSA decryption[A]. MYCRYPT 2005[C]. 2005.183-195.
|
[3] |
MIYAMOTO A , HOMMA N , AOKI T , et al. Enhanced power analysis attack using chosen message against RSA hardware implementa-tions[A]. IEEE International Conference on Field Programmable Logic and Applications[C]. 2008.3282-3285.
|
[4] |
HOMMA N , MIYAMOTO A , AOKI T , et al. Comparative power analysis of modular exponentiation algorithms[J]. IEEE Transaction on Computers, 2010.795-807.
|
[5] |
YENSM , LIEN W C , CHEN C N . Modified doubling attack by ex-ploiting chosen ciphertext of small order[A]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sci-ences[C]. 2011.1981-1990.
|
[6] |
FAN J , GIERLICHS B , VERCAUTEREN F . To infinity and beyond:combined attack on ECC using points of low order[A]. International Workshop on Cryptographic Hardware and Embedded Systems[C].CHES, LNCS, 2011.
|
[7] |
HANKERSON D , MENEZES A , VANSTONE S . Guide to Elliptic Curve Cryptography[M]. New York, USA: Springer-Verlagn, 2003.
|
[8] |
CORON J S . Resistance against differential power analysis for elliptic curve cryptosystems[A]. International Workshop on Cryptographic Hardware and Embedded Systems[C].CHES, LNCS, 1999.
|
[9] |
CHEN T , LI H , WU K , YU F . Countermeasure of ECC against side-channel attacks: balanced point addition and point doubling op-eration procedure[A]. AsiaPacific Conference on Information Proc-essing 2009[C]. 2009.465-469.
|
[10] |
LUO P , FENG D G , ZHOU Y B . Power model in power analysis at-tack[J]. Journal on Communications, 2012,33(Z1): 276-282.
|